期刊文献+

网络传输中采用隐蔽通道实现秘密通信 被引量:5

Implementation of Secret Communication with Covert Channels in Network Traffic
下载PDF
导出
摘要 秘密通信是指要隐藏通信的实际存在。在网络传输中利用隐蔽通道实现秘密通信,涉及到网络安全和采用数据隐藏技术实现网络隐私。主要讨论隐蔽通道的研究框架、分类、评估,以及秘密通信协议的设计问题。隐蔽通道可以分为结构模式、行为模式和内容模式,比较各种不同通道例证,阐明结构模式和行为模式通道更容易被消除,而内容模式则更为可靠并且具有较高的带宽。多种通道模式混用将更适合于秘密通信协议的开发。 Secret communication is to hide the existence of communication. This work relates network security and privacy with data hiding techniques, focusing on secret communication using covert channels in network traffic. The framework, classification and evaluation of covert channels and design issues in secret communication protocols were investigated. Covert channels were divided into structure-mode, behavior-mode and content-mode. The comparison of different channels illustrates that channels in structure-mode and behavior-mode are generally more apt to be eliminated while those in content-mode are more reliable and of high-bandwidth. A combination of different kinds of channels should be appropriate for developing secret communication protocols.
出处 《计算机科学》 CSCD 北大核心 2009年第5期115-117,176,共4页 Computer Science
基金 黑龙江省教育厅科学研究项目(No.11511119) 黑龙江省重点学科(No.081203) 黑龙江省智能教育重点实验室资助
关键词 秘密通信 数据隐藏 隐蔽通道 Secret communication, Data hiding, Covert channel
  • 相关文献

参考文献11

  • 1Larapson B W.A note on the confinement problem[J].Proc.of the Communication of the ACM,1973,16(10):613-615
  • 2Simmons G J.The prisoners' problem and the subliminal channel[C]//Chaum D,ed.Advances in Cryp to logy:Proceedings of CRYPTO'88.New York:Plenum Press,1984:51-67
  • 3Gtigor V.A guide to understanding covert channel analysis of trusted systems[M].NCSC-TC-030.National Computer Security Center.Version 1,Nov.1993
  • 4Wolf M.Covert channels in LAN protocols[C]//Lecture Notes in Computer Science.New York,1989:91-101
  • 5Handel T G,Sendford M T.Hiding data in the OSI network model[C]// Proceedings of Information Hiding,first international workshop.Cambridge,UK,Berlin,Springer-Verlag,1996:23-38
  • 6Rowland C H.Covert channels in the TCP / IP protocol suite[EB/OL].URL:http://www,psionic,com/papers/covert/coverr.tcp.txt.1996-11-14
  • 7Giffin J,Greenstadt R,Litwack P,et al.Covert messaging in TCP[M]//Dingledine R,Syverson P,eds.Privacy Enhancing Technologies.Lecture Notes in Computer Science.Volume 2482,Springer-Verlag,2002:194-208
  • 8Abad C.IP Checksum Covert channels and selected Hash Collision[EB/OL],http://www,gravitino,net/-aempirei/papers/ pccc.pdf,2001
  • 9Ahsan K,Kundur D.Practical Data Hiding in TCP / IP[C]// Workshop Multimedia and Security at ACM Muhimedia'02.December 2002
  • 10Project Loki[EB/OL].ICMP Tunneling.http://www,phrack.org/show,php? p=49&a=6

同被引文献27

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部